Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Unit 05 Computers, Society and Law Unit Reference Number K/617/3038 Unit Title Computers, Society and Law  Unit Level 6 Number of Credits 20 Total Qualification Time 200 Mandatory / Optional Mandatory SSAs 06

Unit 05 Computers, Society and Law Unit Reference Number K/617/3038 Unit Title Computers, Society and Law  Unit Level 6 Number of Credits 20 Total Qualification Time 200 Mandatory / Optional Mandatory SSAs 06

Computer Science

Unit 05 Computers, Society and Law

Unit Reference Number

K/617/3038

Unit Title

Computers, Society and Law 

Unit Level

6

Number of Credits

20

Total Qualification Time

200

Mandatory / Optional

Mandatory

SSAs

06.1 ICT practitioners

Unit Grading Structure

Pass/Fail 

Unit Aims

The aim of this unit is to develop learners’ ability to deal with work related IT issues that apply beyond the immediate tasks of the Information Technology practitioner, ie ethical, legal and societal considerations. Formal legal requirements and responsibilities of the profession are included, as are the relevant professional codes of conduct. 

 

Learning Outcomes and Assessment Criteria

 

Learning Outcomes- The learner will:

Assessment Criteria- The learner can:

1. Understand ethical concerns relating to Information Technology activities.

1.1 Analyse the types of conflicts of interest for IT professionals.

1.2 Critically evaluate various ethical issues for IT professionals. 

1.3 Identify ethical issue(s) within an IT organisation and recommend solutions.

2. Understand the legislative environment relating to Information Technology activities.

2.1 Critically evaluate the implications of legislation for IT activities.

2.2 Critically evaluate the impact of related legislation on the IT sector.

3. Understand common types of computeroriented crimes.

3.1 Define the main categories of cybercrime. 

3.2 Critically evaluate the major categories of cybercrime.

4. Be able to review security risks in an organisation and design an IT security policy.

4.1 Evaluate various risk assessment procedures.

4.2 Summarise the BS ISO 31000:2009 risk management principles and guidelines.

4.3 Describe how IT security can be aligned with organisational policy. 

4.4 Design and implement an IT security policy for an organisation.

 

 

 

 

Scenario 

 

You have attended an Ethical Hacker forum as a student of OTHM and learnt that as an Information Technology practitioner you have to make a number of ethical, legal and societal judgements.

 

All OTHM students are expected to have a good knowledge of how they can positively contribute to the society. Your tutor will assign you the following tasks that will focus on making you a well-informed IT practitioner.   

Task 1 of 2 – Written Report 

 

You are tasked with producing a written report which includes:

 

Instructions

 

  1. An analysis types of conflicts of interest for IT professionals.
  2. A critical evaluation of various ethical issues for IT professionals.
  3. A clear identification of ethical issue(s) within an IT organisation of your choice and recommend solutions for the organisation.

                                                                                                    (LO1, AC1.1, 1.2, 1.3)

 

  1. A critical evaluation of the implications of legislation for IT activities.
  2. A critical evaluation of the impact of related legislation on the IT sector.

                                                                                                    (LO2, AC 2.1, 2.2)

 

  1. Defining the main categories of cybercrime.
  2. A critical evaluation of the major categories of cybercrime

                                                                                                    (LO3, AC 3.1, 3.2)

  1. A evaluation of various risk assessment procedures. 
  2. A summary of the BS ISO 31000:2009 risk management principles and guidelines.
  3. A description of how IT security can be aligned with organisational policy.

                                                                                               (LO4, AC4.1, 4.2, 4.3)

 

 

Delivery and Submission

 

? 1x Word file (circa 2200 words excluding TOC, diagrams, references and appendices) 

 

 

 

 

 

Task 2 of 2 – Policy document 

 

You are commissioned by the organisation you selected in Task 1 (c) to prepare a policy document. 

 

Instructions

Your document will consist of two parts. 

  1. Design an IT security policy for your chosen organisation.
  2. Implement your IT security policy in your chosen organisation.

(Note: this is a practical task. Theoretical and imaginary answer is not acceptable for this task)

Delivery and Submission

? 1x Word file (circa 800 words excluding TOC, diagrams, references and appendices)

Option 1

Low Cost Option
Download this past answer in few clicks

22.99 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE